Networking Final

127 Questions  I  By Kdrost
Quiz questions from after the midterm - final. (go to my other quiz for the earlier stuff)

  
Changes are done, please start the quiz.


Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  Access Points come set up with what type of security enabled by default?
A.
B.
C.
D.
E.
2.  You need to install wireless Internet access in an open warehouse environment. After installing the equipment the technician notices varying signal strengths throughout the warehouse. What could you do to resolve this?
A.
B.
C.
D.
E.
3.  What is the frequency range of the IEEE 802.11a standard?
A.
B.
C.
D.
4.  What is the frequency range of the IEEE 802.11g standard?
A.
B.
C.
D.
5.  Which wireless standard allows you to channel bond to increase bandwidth and uses both the 2.4 GHz and 5 GHz frequencies?
A.
B.
C.
D.
6.  Which devices can interfere with the operation of a wireless network becasue they operate on similar frequencies?( choose 2)
A.
B.
C.
D.
E.
F.
7.  How many non-overlapping channels are available with 802.11b?
A.
B.
C.
D.
8.  How many non overlapping channels are avialable with the original 802.11a?
A.
B.
C.
D.
9.  What is the maximum data rate for the 802.11a standard?
A.
B.
C.
D.
10.  You need to install wireless on multiple floors of a large building and maintenance area. What is your first concern before installing the AP's?
A.
B.
C.
D.
11.  What is the maximum data rate for the 802.11b standard?
A.
B.
C.
D.
12.  You connect a new host to your company's wireless network. The host is set to receive a DHCP address, the SSID and the WEP key are entered correctly. However, the host cannot connect to the network. What is the likely problem?
A.
B.
C.
D.
13.  Which is the highest encryption that WPA2 can use?
A.
B.
C.
D.
14.  Which additonal configuration step is necessary in order to connect to an access point that has SSID broadcasting disabled?
A.
B.
C.
D.
15.  Which spread-spectum technology does the 802.11b standard define for operation?
A.
B.
C.
D.
E.
16.  Which wireless LAN design ensures that a mobile wireless client will not lose connectivity when moving from one access point to another?
A.
B.
C.
D.
17.  You have installed a point-to-point connection using wireless bridges and omni-directional antennas between two buildings. The throughput is low. What can you do to improve the link?
A.
B.
C.
D.
18.  What is one reason the WPA encryption is preferred over WEP
A.
B.
C.
D.
19.  Which is true regarding dynamic routing?
A.
B.
C.
D.
20.  Which of the following is true for MAC addresses?
A.
B.
C.
D.
21.  The time required by protocols to update their forwarding tables after changes have occured is called what?
A.
B.
C.
D.
22.  What command would be used to view the ARP cache on you host?
A.
B.
C.
D.
23.  What happens when a router receives a packet for a network that isn't listed in the routing table?
A.
B.
C.
D.
24.  Which of the following is NOT a Distance Vector protocol?
A.
B.
C.
D.
25.  Which of the following is a Link State Protocol
A.
B.
C.
D.
26.  Which of the following is a hybrid routing protocol?
A.
B.
C.
D.
27.  What two pieces of information does a router require to make a routing decision? A patial answer is OK; wrong answers will be subtracted from right ones.
A.
B.
C.
D.
28.  Where does a frame have to carry a packet if it is destined for a remote network?
A.
B.
C.
D.
29.  What type of request must a client send if it does NOT know the designation MAC address?
A.
B.
C.
D.
30.  You need to preform maintenance on a router in your corporate office. It is important that the network does not go down. What can you do to accomplish your goal?
A.
B.
C.
D.
31.  Why would you want to use a dynamic routing protocol instead of the using static routes?
A.
B.
C.
D.
32.  Which of the following is a vendor-specific routing protocol?
A.
B.
C.
D.
33.  RIP has a long convergence time and users have been complaining of response time when a router goes down and RIP had to reconverge. Which can you implement to improve convergence time on the network?
A.
B.
C.
D.
34.  Which of the following uses only hop count as a metric to find the best path to a remote network?
A.
B.
C.
D.
35.  What are the 2 categories of routing protocols? A partial answer is OK; wrong answers will be subtracted from right.
A.
B.
C.
D.
36.  To reduce the possibilityof security break-ins from unauthorized users, which should be implemented?
A.
B.
C.
D.
37.  What is the main difference between a private network and a public network?
A.
B.
C.
D.
38.  Which IP address should you DENY into your internetwork?
A.
B.
C.
D.
39.  Which of the following is a tunneling protocol?
A.
B.
C.
D.
40.  Which layer of the OSI model does IPSec operate in?
A.
B.
C.
D.
41.  Companies that want to ensure their data is secure during transit should follow what practice?
A.
B.
C.
D.
42.  To encode or read an encrypted message, what tool is necessary?
A.
B.
C.
D.
43.  Which network utilities do NOT have the ability to encrypt passwords? Select 2..
A.
B.
C.
D.
44.  Which keys are known as symmetrical keys?
A.
B.
C.
D.
45.  Which of the following is NOT a type of public-key encryption?
A.
B.
C.
D.
46.  You asked your ISP for a connection that provides you with 5 or 6 valid host addresses. He gave you 5... why only 5?
A.
B.
C.
D.
47.  You put your home router at address 10.123.123.123 because it's easy to remember. You only want a "window" of 6 addresses in your router's subnet. How many bits would there be in the network portion of your subnet mask?
A.
B.
C.
D.
E.
F.
48.  Your router is at address 10.18.18.18 and there are 6 valid hosts in its subnet. What is the address of its subnet?
A.
B.
C.
D.
E.
49.  You are connecting two routers and don't want to waste IP addresses. What is the least number of host bits required in the subnet mask to connect them?
A.
B.
C.
D.
E.
50.  What does a 29 bit subnet mask look like?
A.
B.
C.
D.
E.
51.  To enable priviledged mode on a Cisco router, you enter ____ at the command prompt
52.  You've entered interface configuration mode on a Cisco router. How do you set its IP address to 142.156.113.3 with a 30 bit subnet mask?
53.  You're using 30 bit subnet masks. THe last subnet was at 142.156.113.88.... what's the address of the next subnet?
A.
B.
C.
D.
E.
F.
G.
54.  In interface configuration mode on a Cisco router, what is the command to start up the interface?
55.  You're several layers deep in Cisco IOS configuration. What's the single command that will back you right out to priviledged mode?
56.   What's the command (with parameters) in Cisco IOS to save the running memory to non-volatile memory?
57.  Your router's IP address is 142.156.113.3. What is a command (with parameters) to test if your computer (or another router) can communicate with your router?
58.  What's the command (with parameters) in Cisco's IOS to designate the router at 142.156.113.3 as your default gateway?
59.  What is the Cisco IOS command to turn on the RIP routing protocol?
60.  Why would you want to force RIP to version 2 instead of the default?
A.
B.
C.
D.
E.
61.  What does a router do with packets from an IP subnet that's not on its routing tables?
A.
B.
C.
D.
E.
62.  Q) You configured your router with static route that basically says "send everything to this address...". Why does it ignore this rule when sending to hosts on the attached local network? A) Directly-connected networks have a higher precedence in the routing tables than static or dynamic addresses, and will be checked first
A.
B.
63.  What protocol is used to find the hardware address of a local device?
A.
B.
C.
D.
E.
64.  You need to login to a Uniz server accross a network that is not secure. Which of the following protocols will allow you to remotely administrator this server securely?
A.
B.
C.
D.
65.  Which of the following services use TCP? (choose 3)
A.
B.
C.
D.
E.
F.
66.  Which of the following are TCP/IP protocols used at the Application layer of the OSI model? (Choose 3)
A.
B.
C.
D.
E.
67.  Which of the following protocols can use TCP and UDP< permits authentication and secure polling of network devices, and allows for automated alerts and reports on network devices?
A.
B.
C.
D.
68.  This device sends and recieves information about the network layer
A.
B.
C.
D.
69.  This layer creates a virtual circuit before transmitting between two end stations
A.
B.
C.
D.
70.  This device uses hardware addresses to filter a network
A.
B.
C.
71.  This device can measure the distance to a remote network
A.
B.
C.
72.  Hardware addresses are defined at the ______ layer Logical addresses are defined at the ________ layer
A.
B.
C.
D.
E.
73.  ______ creates many smaller collision domains, but the network is still one large broadcast domain ______ creates one big collision domain, and one large broadcast domain ______ breaks up collision and broadcast domains
A.
B.
C.
D.
74.  What's the command to show the Ip routing table? (directly-connected, static & dynamic entries)
75.  What's the Cisco routing command to set the IP on current interface to 10.10.10.1, subnet mask 255.255.255.0
76.  What's the Cisco routing command to enter configuration-from-terminal mode?
77.  What's the Cisco routing command to force the interface to full duplex?
78.  What's the command to back out of interface configuration, to base configuration?
79.  What’s the command to back out of all configuration levels at once?
80.  What’s the command to save the running configuration to non-volatile memory? 
81.  What is the command to configure 10.10.10.1 as the default gateway?
82.  Which TWO of the following are private IP addresses? Choose 2 answers.
A.
B.
C.
D.
E.
83.  Which of the following two statements are true?
A.
B.
C.
D.
E.
84.  What is the command, with options, to list a Windows computer's IP settings ... IP, subnet, default gateway, DNS, etc?
85.  On a network which mask should you use on point-to-point WAN links in order to reduce the waste of IP addresses
A.
B.
C.
D.
E.
86.  When you ping another host that's in the same subnet, your machine will first issue an ARP request to get its MAC address. If you ping the same host 2 minutes later, it won't ARP
A.
B.
87.  What is the valid range of values that may appear in an IPv4 octet? Give your answer in decimal as well as binary.
88.  Write the subnet address for 192.168.100.99/25
89.  You have a class A host of 10.0.0.110/25. It needs to communicate to a host with and IP address of 10.0.0.210/25 . Which of the following devices do you need to use in order for these hosts to communicate
A.
B.
C.
D.
90.  TCP and UDP reside at which layer of the OSI model?
A.
B.
C.
D.
E.
F.
G.
91.  Which is a valid Class B address?
A.
B.
C.
D.
92.  Which of the folllowing describes a broadcast address?
A.
B.
C.
D.
93.  What protocol is used to find the hardware address of a local device?
A.
B.
C.
D.
94.  What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask?
A.
B.
C.
D.
E.
F.
95.  You want to implement a mechanism that automates the IP configuration, including IP address, subnet mask, default gateway and DNS addresses. Which protocol will you use to accomplish this?
A.
B.
C.
D.
96.  If your host does not have a default gateway defined, a ping to a host in another subnet won't even be attempted.
A.
B.
97.  In a class C IP address, how long is the network address?
A.
B.
C.
D.
98.  If a host on a network has the address 172.16.45.14/30 What is the address of the subnet this host belongs to?
A.
B.
C.
D.
E.
99.  What protocol helps devices avoid having two devices transmit at the same time on the network medium?
A.
B.
C.
D.
100.  At which layer of the OSI model do bridges, hubs, and routers primarily operate, respectively?
A.
B.
C.
D.
101.  What are the two major advantages of fibre optic cabling? It is completely immune to EMI and RFI and can transmit up to 40 kilometres (about 25 miles). It's harder to eavesdrop or wire-tap.
A.
B.
102.  Which of the following allows a server to distinguish among different simultaneous requests from the same host?
A.
B.
C.
D.
103.  _____ This identifies the application the messages is for _____ This identifies the end host the message is for _____ This identifies the next hop to the destination _____ Hardware addresses are defined at this layer
A.
B.
C.
104.  How many valid host addresses are in each subnet of 192.168.100.99/25
105.  The maximum distance of 1000Base-T is ?
A.
B.
C.
D.
106.  What is the valid host range for 192.168.100.99/25
107.  A host uses the ________ address to decide whether or not to read in a frame from the media (wire) and pass it up. It uses the _______ address to decide if the message is meant for it, and the ________ address to decide which process should get the message.
A.
B.
C.
108.  Which of the following is a valid Class A address?
A.
B.
C.
D.
109.  Two hubs, each connected to a switch port:
A.
B.
C.
D.
110.  Which of the following is a Class C network address
A.
B.
C.
D.
111.  The _________ layer of the OSI model specifies voltage, wire speed, and connector pin-outs, and moves bits between devices. Provide the name, not its number.
112.  A network administrator uses a crossover cable to connect Host A (IP address 192.168.1.20 Mask 255.255.255.240) and Host B (IP address 192.168.1.201 Mask 255.255.255.240) directly through their Ethernet interfaces. Ping attempts between Host A and Host B are unsuccessful . What can be done to provide connectivity between the Hosts?
A.
B.
C.
D.
E.
113.  A cross-over cable is used to connect all the following EXCEPT:
A.
B.
C.
D.
114.  What is the loop back address?
115.  Which of the following is a valid IP address that can be used on the Internet (meaning the public addressing scheme)?
A.
B.
C.
D.
116.  Which of the following provides the longest cable run distance
A.
B.
C.
D.
117.  Which of the following addresses is not allowed on the Internet? Choose 2 answers.
A.
B.
C.
D.
118.  What is the subnetwork address for a host with the IP address 200.10.5.68/28?
A.
B.
C.
D.
119.  You receive a call from a user that is complaining that they cannot get on the Internet. You have them verify their IP address, mask, and default geteway. The IP address is 104.0.37.144 with a subnet mask of 255.255.254.0 The default getaway is 104.0.38.1 What is the problem?
A.
B.
C.
D.
120.  On an Ethernet switched network, what address does one host computer use to communicate with another?
A.
B.
C.
121.  What is the highest usable address on the 172.16.1.0/24 network?
A.
B.
C.
D.
122.  Write the broadcast address for 192.168.100.99/25
123.  You enter the command "ping www.conestogac.on.ca" into a command prompt and get the response "Ping request could not find host www.conestogac.on.ca.". However, if you ping the server's IP address, you get a reply. What is likely the problem?
A.
B.
C.
D.
E.
124.  You want to connect a host to a switch port. What type of Ethernet cable would you use?
125.  Which device by default does NOT forward any broadcast or multicast packets
A.
B.
C.
D.
126.  You have an interface on a router with the IP address of 192.168.192.10/29 Including the router interface, how many hosts can have IP addresses on the LAN attached to that router interface?
A.
B.
C.
D.
E.
127.  You need to transfer files between two hosts. Which two protocols can you use?
A.
B.
C.
D.
E.
Back to top


to post comments.

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz